Cybersecurity

Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports

Authors: Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams | Published: 2024-01-03
Cybersecurity
Attack Method
Time-Related Features

Opening A Pandora’s Box: Things You Should Know in the Era of Custom GPTs

Authors: Guanhong Tao, Siyuan Cheng, Zhuo Zhang, Junmin Zhu, Guangyu Shen, Xiangyu Zhang | Published: 2023-12-31
Cybersecurity
Phishing Attack
Prompt Injection

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

Authors: Siva Raja Sindiramutty | Published: 2023-12-30
Role of AI and Automation
XAI (Explainable AI)
Cybersecurity

SecQA: A Concise Question-Answering Dataset for Evaluating Large Language Models in Computer Security

Authors: Zefang Liu | Published: 2023-12-26
LLM Performance Evaluation
Cybersecurity
Prompt Injection

An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids

Authors: Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, Andreas Ulbig | Published: 2023-12-21
Cybersecurity
Dataset Generation
Network Node Configuration

Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis

Authors: Ömer Sen, Bozhidar Ivanov, Martin Henze, Andreas Ulbig | Published: 2023-12-21
Cybersecurity
Data Generation
Attack Graph Generation

Purple Llama CyberSecEval: A Secure Coding Benchmark for Language Models

Authors: Manish Bhatt, Sahana Chennabasappa, Cyrus Nikolaidis, Shengye Wan, Ivan Evtimov, Dominik Gabi, Daniel Song, Faizan Ahmad, Cornelius Aschermann, Lorenzo Fontana, Sasha Frolov, Ravi Prakash Giri, Dhaval Kapil, Yiannis Kozyrakis, David LeBlanc, James Milazzo, Aleksandar Straumann, Gabriel Synnaeve, Varun Vontimitta, Spencer Whitman, Joshua Saxe | Published: 2023-12-07
LLM Security
Cybersecurity
Prompt Injection

Understanding (Un)Intended Memorization in Text-to-Image Generative Models

Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr | Published: 2023-12-06
Evolution of AI
Watermarking
Cybersecurity

A Unified Hardware-based Threat Detector for AI Accelerators

Authors: Xiaobei Yan, Han Qiu, Tianwei Zhang | Published: 2023-11-28
FPGA
Cybersecurity
Model Performance Evaluation

Understanding the Process of Data Labeling in Cybersecurity

Authors: Tobias Braun, Irdin Pekaric, Giovanni Apruzzese | Published: 2023-11-28
Cybersecurity
Challenges of Data Labeling
Expert Opinion Collection